We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography

by R. Venkateswaran, Dr. V. Sundaram
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 7
Year of Publication: 2010
Authors: R. Venkateswaran, Dr. V. Sundaram
10.5120/741-1047

R. Venkateswaran, Dr. V. Sundaram . Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography. International Journal of Computer Applications. 3, 7 ( June 2010), 28-31. DOI=10.5120/741-1047

@article{ 10.5120/741-1047,
author = { R. Venkateswaran, Dr. V. Sundaram },
title = { Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { June 2010 },
volume = { 3 },
number = { 7 },
month = { June },
year = { 2010 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume3/number7/741-1047/ },
doi = { 10.5120/741-1047 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:51:19.345555+05:30
%A R. Venkateswaran
%A Dr. V. Sundaram
%T Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 3
%N 7
%P 28-31
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper shows the possibility of exploiting the features of Genetic Algorithm with poly substitution methods in a linear way, to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography.

References
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Genetic Keys Mono Substitution Poly Substitution